Generate GUIDs from job=generate-docs branch=master [skip ci]

This commit is contained in:
Atomic Red Team GUID generator
2023-01-04 03:19:21 +00:00
parent 6db82cba9c
commit b5dde3c8f2
3 changed files with 6 additions and 0 deletions
+2
View File
@@ -2,6 +2,7 @@ attack_technique: T1505.004
display_name: IIS Components
atomic_tests:
- name: Install IIS Module using AppCmd.exe
auto_generated_guid: 53adbdfa-8200-490c-871c-d3b1ab3324b2
description: |
The following Atomic will utilize AppCmd.exe to install a new IIS Module. IIS must be installed.
This atomic utilizes a DLL on disk, but to test further suspiciousness, compile and load [IIS-Raid](https://www.mdsec.co.uk/2020/02/iis-raid-backdooring-iis-using-native-modules/).
@@ -35,6 +36,7 @@ atomic_tests:
%windir%\system32\inetsrv\appcmd.exe uninstall module #{module_name}
name: command_prompt
- name: Install IIS Module using PowerShell Cmdlet New-WebGlobalModule
auto_generated_guid: cc3381fb-4bd0-405c-a8e4-6cacfac3b06c
description: |
The following Atomic will utilize PowerShell Cmdlet New-WebGlobalModule to install a new IIS Module. IIS must be installed.
This atomic utilizes a DLL on disk, but to test further suspiciousness, compile and load [IIS-Raid](https://www.mdsec.co.uk/2020/02/iis-raid-backdooring-iis-using-native-modules/).
+1
View File
@@ -24,6 +24,7 @@ atomic_tests:
}
name: powershell
- name: Disable Windows IIS HTTP Logging via PowerShell
auto_generated_guid: a957fb0f-1e85-49b2-a211-413366784b1e
description: |
Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union).
This action requires HTTP logging configurations in IIS to be unlocked.
+3
View File
@@ -1199,3 +1199,6 @@ b1cbdf8b-6078-48f5-a890-11ea19d7f8e9
999bff6d-dc15-44c9-9f5c-e1051bfc86e1
40075d5f-3a70-4c66-9125-f72bee87247d
fe7974e5-5813-477b-a7bd-311d4f535e83
53adbdfa-8200-490c-871c-d3b1ab3324b2
cc3381fb-4bd0-405c-a8e4-6cacfac3b06c
a957fb0f-1e85-49b2-a211-413366784b1e